Author of the publication

A BLP-Based Access Control Mechanism for the Virtual Machine System.

, , , and . ICYCS, page 2278-2282. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coarse Fingerprint Matching Based on Singular Points., and . Security and Management, page 425-433. CSREA Press, (2005)Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback., , and . J. Appl. Math., (2013)Double Insurance: Incentivized Federated Learning with Differential Privacy in Mobile Crowdsensing., , , and . SRDS, page 81-90. IEEE, (2020)Simulation and Design of an Underwater Lidar System Using Non-Coaxial Optics and Multiple Detection Channels., , , , , , , , and . Remote. Sens., 15 (14): 3618 (July 2023)An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail., , and . IEEE Trans. Veh. Technol., 65 (10): 8658-8668 (2016)Capacity of Distributed Storage Systems with Clusters and Separate Nodes., , , and . CoRR, (2019)On the relative profiles of a linear code and a subcode., , , and . Des. Codes Cryptogr., 72 (2): 219-247 (2014)Information-Theoretical Security for Several Models of Multiple-Access Channel, , , and . CoRR, (2012)Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes., , , , and . IEEE Trans. Inf. Theory, 60 (10): 5938-5949 (2014)An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds., , , and . IEEE Secur. Priv., 8 (6): 56-62 (2010)